MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2c52595ab1893c638924dae5382e93857c85aa6e5352464747ef8e679ef28d01. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 2c52595ab1893c638924dae5382e93857c85aa6e5352464747ef8e679ef28d01
SHA3-384 hash: c9ef1b11430e5b68b599ddf9575243ff3c1ebef6c091ccc5390c83f3f52cd7bff7096cac1533d04c565bc2df5b9065d6
SHA1 hash: 13d9d537b219405b6444a0dc1b7ad3bc76629b7a
MD5 hash: 6b42f6a368614d62916dc36864a5bdc4
humanhash: bravo-montana-eleven-october
File name:6b42f6a368614d62916dc36864a5bdc4
Download: download sample
Signature CobaltStrike
File size:204'288 bytes
First seen:2020-10-25 08:02:10 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash e66a62b251fcfbbc930b074503d08542 (24 x CobaltStrike)
ssdeep 3072:HNEfMCK7JqusgLiKG5TnN7FgkQB7R80kUzRe531:SfM5dS/JBN7jiR80Vs
Threatray 138 similar samples on MalwareBazaar
TLSH EB148CA53184E032D45B0434674BC77E5E7CBDF016A1A987BFC81E599E716A3EB2A303
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
59
Origin country :
n/a
Vendor Threat Intelligence
Detection:
CobaltStrikeBeacon
Result
Verdict:
Malware
Maliciousness:
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 303622 Sample: dz8QI9H0Ze Startdate: 25/10/2020 Architecture: WINDOWS Score: 68 18 Malicious sample detected (through community Yara rule) 2->18 20 Antivirus / Scanner detection for submitted sample 2->20 22 Multi AV Scanner detection for submitted file 2->22 24 Machine Learning detection for sample 2->24 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        11 rundll32.exe 7->11         started        process5 13 WerFault.exe 23 9 9->13         started        dnsIp6 16 192.168.2.1 unknown unknown 13->16
Threat name:
Win32.PUA.CobaltStrikeBeacon
Status:
Malicious
First seen:
2019-07-01 01:44:00 UTC
AV detection:
30 of 31 (96.77%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Malware Config
C2 Extraction:
http://37.252.15.241:80/ga.js
Unpacked files
SH256 hash:
2c52595ab1893c638924dae5382e93857c85aa6e5352464747ef8e679ef28d01
MD5 hash:
6b42f6a368614d62916dc36864a5bdc4
SHA1 hash:
13d9d537b219405b6444a0dc1b7ad3bc76629b7a
Detections:
win_cobalt_strike_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments